MIS final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Cookie

A _____ is a small text file passed to web browser on a user's computer by a web server.

downstream

A ______ information flow relates to the information that is produced by a company and sent along to another organization

sharing economy

A _________ is defined as an economic system in which assets or services are shared between private individuals, either free or for a fee

Justin works on the system to make the user interface more user-friendy

A company has a five-member team in charge of the development and maintenance of its information systems. An Information system is in place and the team-performs routine maintenance to keep it running smoothly. Which of the following scenarios is an example of perfective maintenance?

to indicate the topic and relate the tweet to other tweets about the same topic

A hash tag is used in a tweet

Process and decision making to orchestrate the day to day operations of an organization

Administrative focus on the _______

Risk Acceptance

An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occure

Cloud Computing

As defined by the national institute of standards and technology (NIST) is a model for enabling ubiquitous, convenient

Operations and manufacturing

Assembly processes are ________ activities.

Managerial

At the ____ level of an organization, functional manages focus on monitoring and controlling operational level activities and providing information to high levels of the organization

Historical data

Backward looking budgets are typically based on _______

Characterized based on its high velocity

Big Data is ______.

Facts

Business case arguments based on data, quantitive analysis, and/or indisputable factors are known as arguments based on ________

The ratio of surfers who click on an ad divided by the number of times it was displayed

Click through rate reflects______.

Allow for easy trasferability of documents from one person to another

Cloud based collaboration tools ______

Transportation

Distribution planning leads to the overall development of the overall ______ plan

cyber squatting

Fyroff consultants,a leading software consulting firm in the United States,decides to launch an Enterprise Resource Planning (ERP)solution.The company chooses the brand name FyroffEnterprise for the new solution.However,when the company attempts to register the domain name,it finds that a small unknown firm is already registered under the same domain name.The small firm is now attempting to sell the domain name to Fyroff.Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks?

That will respond to the web request

Host name

by charging a commission on transactions

How do comparison shopping sites generate revenue?

Evolution of Technology

Identify a key factor of globalization

Evolution of Technology

Identify a key factor of globalization.

Identifying how to recognize, generate, store, share, and manage tacit knowledge

Identify the primary goal for deploying knowledge management system.

pay-per-click

If a company's web sites is in the sponsored list of a search engine, the search engine receives revenue on a _____ basis

vanilla

If the ______ version does not support a certain business process, the company may require a customized version

Tracking

In the context of GPS- Enabled location-based services, the ability to see another persons location is an example of _______ service.

process

In the context of organizational requirements for innovation to deploy innovation information system well, people in the organization must be willing to do whatever they can to bypass and eliminate internal bureaucracy, set aside political squabbles and pull together for the common good.These requirements can be categorized

Issuing the purchase order

In the procure to pay process the negotiation of price and term is followed by ________

computer literacy

Joe and megan know how to use a computer. Which of the following describes this fact?

The bull whip efftect

La Belle Inc introduced a new line of accessories for teenaged girls last season. following it's immense popularity with the targeted group, the company anticipated high sales htis season. it ordered raw materials accordingly, and even ensured that they had sufficient inventory to meet excess demand, if any. however, the success of the new line turned out to be a fad, as the teens soon turned to other products offered by competing brands, and La Belle's sales declined. This caused a huge discrepancy in the amount of raw materials they needed and the amount of inventory they had piled up in anticipation of good sales. This is an example of

resource

Organizations deploying innovative information systems must have the human capital necessary to deploy the new systems. These requirements can be

Making changes to an information system to reduce the chance of future system features

Preventive maintenance of a system involves _________.

focuses on the coordination of all activities needed to create the product or service.

Production scheduling ________

Folksonomies

Social bookmarking allows users to share internet bookmarks and to create categorization systems. These categorization systems are referred to as ______

Collocation facilities

Some data centers rent server space to multiple customers and provide necessary infrastructure such as data centers are called

Operational

Systems that are used to interact with customers and run a business in real time are called ________ systems

effectivness

The extent to which tasks are accomplished well is called _______

maintenance

The final phase of the systems development life cycle is systems________.

infrastructure

The hardware and software that must be implemented to support the applications that the primary activities use are a part of the _______ activities.

conversion rate

The performance of a pay per click advertising model can be assessed by ________ marketer's desired action such as making a purchase

because the foundational protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP).

The protocol used by the internet is called the

Supply Chain

The term ___ is commonly used to refer to a collection of companies and processes involved in moving a product from the suppliers of raw materials to the customer.

can be played on a variety of devices in addition to Apple's iPods

The term podcasting is a misnomer because podcasts

Cloud Computing

The various services offered by Google, such as Gmail (e-mail), Google drive (word processing) or google calendar, are good example of _________

Cloud computing

The various services offered by google, such as Gmail (e-mail), google drive (word processing), or google calendar, are good examples of _______

Business model

What a company does, how a company uniquely does it how a company gets paid for doing it and what costs are involved are all part of an organizations

structural firmness

When a website ensures privacy and security of the consumer's data, ________ can be achieved.

Order-to-cash

When ever an order is placed with online retailers, the retailers put together the order, ship it, and charge the payment to the customers credit card. This process of selling a product or service is know as the _______

Trojan Horse

When shelly downloaded an arcade game from an unknown internet web site, an unauthorized connection unknown to shelly was established with her computer. The arcade game is most likely to be ________.

Blogs

Which of the following Web 2.0 applications has been classified by noted technology journalist Nicholas Carr as the "amateurization" of journalism?

Microsoft hands over its customer service function to convergys

Which of the following can be cited as an example of outsourcing?

It is the cost of producing an additional unit of outpt

Which of the following defines marginal cost?

Analyzing data warehouses to detect changes deemed important by a user tracking inventory levels assembling customized news

Which of the following is a role of data mining agents?

Encrypted messages cannot be deciphered without the decoding key

Which of the following is a valid observation about encrytion?

Belair buys a system from the vendor who offers the cheapest prices.

Which of the following is an example of a basic relationship between an outsourcing vendor and client?

video conferencing

Which of the following is an example of synchronous communication

To optimize the allocation of the available supply to meet demand

Which of the following is the key use of the distribution planning module of supply chain management?

He is responsible for managing an existing information system

Which of the following is true about the responsibility of an is manager in the context of information systems management?

It is the extent to which a system enables the firm to accomplish goals well

Which of the following is true of system effectiveness?

Content delivery networks

Which of the following is used to increase web application performance

Companies using this strategy are trying to optimize their ordering quantities such that parts or raw material arrive just when they are needed for production.

Which of the following statements about just-in-time strategies is true?

They answer unplanned information requests to support a non routine decision

Which of the following statements is true about ad hoc queries?

It is the uses of information systems to gather and analyze information from internal and external sources in order to make

Which of the following statements is true about business intelligence?

These firms operate in both physical and virtual arenas

Which of the following statements is true about firms pursuing a click and mortar business strategy?

It is a representation of reality

Which of the following statements is true about information?

it allows users to create folksonomies

Which of the following statements is true about social bookmarking?

Writing a business letter

Which of the following tasks is performed by application software

Collaboration system

Which of the following types of information systems enables people to communicate, team up, and coordinate with each other?

Collaboration system

Which of the following types of information systems enables people to communicate, team up, and coordination with each other

Business Continuity Plan

Which of the following types of plans describes how business resumes operation after a disaster?

Custom

Which of the following types of software is best suited for tasks that are unique to particular business?

Service Innovation

Which type of innovation is best described as supporting and enhancing the value of an offering

Analyze the root causes of an exception

While using digital dashboards, pull reporting is conducted to ______.

local area

With respect to computer networks, a typical _____ network has a bandwidth of 10 maps to 1 gbps

Local area

With respect to computer networks, a typical ________ network has a bandwidth of 10 Mbps to 1 Gbps.

Office automation

With respect to the types of information systems used in organizations, a word processor is an example of a(n) _____ system

Customer portals

_____ are designed to automate the business processes that occur before, during, and after sales transactions between a supplier and multiple customers

vendor managed inventory

_____ is a business model in which the suppliers to a manufacturing manage the manufacturers inventory levels based on pre-established service levels.

Metadata

_____ is data about data

Packaged

_____ software is written by third party vendors to support standardized and repetitive tasks.

Online transaction processing

_____ systems are designed to handle multiple concurrent transactions from customers

managerial level

_______ decision making in an organization is referred to as semistructured decision making because solutions and problems are not clear cut and often require judgment and expertise.

Data Cleansing

_______ involves standardizing the format of data retrieved from different systems.

Shrink wrap

_______ licenses are activated as soon as the packaging of the software has been removed.

transaction

_______ refers to anything that occurs as part of a daily business of which a record must be kept.

Cyberharassment

_______ refers to the use of a computer to communicate obscene, vulgar, or threatening content that causes a reasonable person to endure distress

Media sharing

________ is a cooperative social media application making use of the network effect

social media monitoring

________ is the process of identifying and assessing the volume and sentiment of what is being said about a company, individual, product, or brand.

Social networking

________ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate.

Enterprise marketing management

________ tools help a company in the execution of the customer relationship management (CRM) strategy by improving the management of promotional campaigns.

Cybersquatting

_________ is the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person, company, or organization most likely to want it.

patriot hackers

independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies


Set pelajaran terkait

Intermediate Accounting Chapter 10

View Set

UNIT 2: FIRE SAFETY AND UTILITY CONTROLS

View Set

Intermediate Accounting II - C249 - Ch 15 Quiz

View Set

CHAPTER 7: UNDERSTANDING INTERPERSONAL RELATIONSHIPS

View Set

Ch. 4: Systems and Cultural Approaches, test 1 - org com

View Set

Enlightenment and Revolutions - MULTIPLE CHOICE - test

View Set

Intro to Supply Chain Management Chapter 7: Inventory Management

View Set